Wi-Fi - World Colleges Information

advertisement
Wireless Fidelity
(Wi-Fi)
Submitted by,
Premsingh Thangasamy.S
9911112007
I year M.Tech
Network Engineering
Agenda










Introduction
How Wi-Fi Works?
Wi-Fi Technology
How to connect Wi-Fi Network?
Wi-Fi Access Protocol
Wi-Fi Applications
Issues in Wi-Fi networks
Wi-Fi Security
Advantages
Limitations
Introduction
Wireless Technology is an alternative to Wired Technology, which
is commonly used, for connecting devices in wireless mode.
A Wi-Fi is an electronic devices, such as a personal computer,
video game console, Smartphone, or digital audio player can connect
to the internet via a wireless network access point.
An access point (or hotspot) has a range of about 20 meters (65
feet) indoors as few rooms and a greater range outdoors, as many
square miles.
Wi-Fi access can provide at Organizations and businesses such as
homes, offices, airports, hotels and restaurants often provide free-use
hotspots to attract or assist clients.
How Wi-Fi works?
There are three most important items which makes Wi-Fi
working in your laptop or desktop. These are,
Radio Signals
Wi-Fi Card which fits in your laptop or computer.
Hotspots which create Wi-Fi Network.
Wi-Fi Technology
Wi-Fi (Wireless Fidelity) is a generic term that refers to the
IEEE 802.11 communications standard for Wireless Local Area
Networks (WLANs).
IEEE 802.11 wireless LANs
provides 1- or 2-Mbps
transmission in the 2.4-GHz band using either frequency-hopping
spread spectrum (FHSS) or direct-sequence spread spectrum
(DSSS).
The 802.11 standard is defined through several specifications of
WLANs such as,
•IEEE 802.11b
•IEEE 802.11a
•IEEE 802.11g
802.11 standards
Parameter
802.11a
802.11b
802.11g
Standard approved
Sept 1999
Sept 1999
June 2003
Available bandwidth
300MHz
83.5MHz
83.5MHz
No. of overlapping
channel
4
3
3
Frequency
5GHz
2.4GHz
2.4GHz
Typical Data Rate
23 Mbit/s
4.5 Mbit/s
19 Mbit/s
Maximum Data Rate
54 Mbit/s
11 Mbit/s
54 Mbit/s
Range
115 feet
115 feet
125 feet
None
None
Compatibility
•
•
fast maximum speed
regulated
frequencies
prevent
signal
interference from other
devices
•
•
lowest cost
signal range is good and
not easily obstructed.
•
•
fast maximum speed
signal range is good and
not easily obstructed
•
•
highest cost
shorter range signal that
is
more
easily
obstructed
•
•
slowest maximum speed
home appliances may
interfere
on
the
unregulated
frequency
band
•
•
costs more than 802.11b
appliances may interfere on
the unregulated signal
frequency
Advantages
Dis-advantages
Backward compatible with b
How to connect Wi-Fi Network?
Basic concept is same as Walkie talkies.
A Wi-Fi hotspot is created by installing an access point to an
internet connection.
An access point acts as a base station.
When Wi-Fi enabled device encounters a hotspot the device
can then connect to that network wirelessly.
A single access point can support up to 30 users and can
function within a range of 100 – 150 feet indoors and up to 300
feet outdoors.
Many access points can be connected to each other via
Ethernet cables to create a single large network.
Wi-Fi Access Protocol
MAC Protocols:
The 802.11 standards use a MAC layer known as
CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance).
In CSMA/CA a Wireless node that wants to transmit & performs
the following sequence:
Listen on the desired channel.
If channel is idle (no active transmitters) it sends a packet.
If channel is busy then, the node waits until the transmission
end then a contention period where minimum time a host must
transmit before it can be sure that the no other host’s packet
has collided with its transmission.
If the channel is still idle at the end of the contention period,
then the node transmits its packet otherwise it repeats the
process defined in step-3 above until it gets a free channel.
Wi-Fi Applications
As Wi-Fi enabled devices have become more and
more popular, wired devices are quickly becoming a thing of
the past. Check out some of the new ways that Wi-Fi is
being used below.
Home or office.
Large Corporations & Campuses
Small Businesses or SOHO.
Whole house connectivity
Public place connectivity
Issues in Wi-Fi networks
Wireless technology doesn’t remove any old security
issues, but introduces new ones.
Hidden Terminal Problem
Exposed Terminal Problem
MITM Attack(Man-in-the-middle attacks)
Hidden Terminal Problem
The hidden node/ terminal problem found at a point to
multipoint network and it is defined as being one in which three
or more nodes are present. Let there are three nodes: node A,
node B and node C.
A and C cannot hear each other.
A sends to B, C cannot receive A.
C wants to send B, C senses a free medium.
Collision occurs at B.
A cannot receive the collision.
A is hidden for C.
Exposed Terminal Problem
Suppose there are four nodes: node A, node B, node
C and node D.Here,
B can send to both A and C.
C can send to D, but not to A or B.
A and C cannot hear each other.
Now the Problem as follows When B transmits to A, C detects the transmission using the
carrier sense mechanism.
So C defers transmitting to D.
But C could have sent to D, so blocked unnecessarily.
MITM Attack
 Attacker
spoofes
a
disassociate
message
from the victim
 The victim starts to look
for a new access point,
and
the
attacker
advertises his own AP on
a different channel, using
the real AP’s MAC
address
 The attacker connects to
the real AP using
victim’s MAC address
Wi-Fi Security Techniques
There are following security mechanisms in Wi-Fi
networks.such as,
Wired Equivalent Privacy (WEP)
Wireless Protected Access (WPA)
Wired Equivalent Privacy (WEP)
Provide same level of security as by wired network.
Uses RC4 based 40-or 104-bit encryption with pre-shared
keys(static key) and 24 bit initialization vectors (IV).
Encrypt data only between 802.11 stations.once it enters the
wired side of the network (between access point) WEP is no
longer valid.
Security Issue with WEP
Short IV
Static key
Offers very little security at all.
Wireless Protected Access (WPA)
This is a new standard from the Wi-Fi Alliance that uses the 40
or 104-bit WEP key, but it changes the key on each packet.
That changing key functionality is called the Temporal Key
Integrity Protocol (TKIP).
Uses RC4,dynamic encryption with sessionkeys and 48 bit
initialization vectors (IV).
Encryption provide Protection against man-in-the-middle
attacks.
Advantages
 Mobility
 Ease of Installation
 Flexibility
 Cost
 Reliability
 Security
 Use unlicensed part of the radio spectrum
 Roaming
 Speed
Limitations
 Compatibility and Interpretability
 Billing Issues
 Interference
 Mobility
 High power consumption
 Limited range
 Data security risks
Conclusion
Wi-Fi is a universal wireless networking technology that
utilizes radio frequencies to transfer data.
Wi-Fi allows for high speed Internet connections without
the use of cables or wires.
It allows you to connect to the Internet from just about
anywhere a coffee shop, a bed in a hotel room or a conference
room at work without wires.
And the best thing of all, it's super fast almost 10 times
faster than a regular dial-up connection.
What is Next?
Now the focus in wireless is shifting to the wide area.
Wi-Max, short for Worldwide Interoperability for Microwave
Access, is defined in IEEE 802.16 standards is designed to
deliver a metro area broadband wireless access (BWA) service.
Wi-MAX is similar wireless system to Wi-Fi, but on a much
larger scale and at faster speeds.
Thank you
Download